The application server must use cryptographic mechanisms to protect the integrity of log information.
An XCCDF Rule
Description
Protecting the integrity of log records helps to ensure log files are not tampered with. Cryptographic mechanisms are the industry-established standard used to protect the integrity of log data. An example of cryptographic mechanisms is the computation and application of a cryptographic hash and using asymmetric cryptography with digital signatures. Application Servers often write log data to files on the file system. These files typically roll over on a periodic basis. Once the logs are rolled over, hashing and signing the logs assures the logs are not tampered with and helps to assure log integrity.
- ID
- SV-204739r960951_rule
- Version
- SRG-APP-000126-AS-000085
- Severity
- Medium
- References
- Updated
Remediation Templates
A Manual Procedure
Configure the application server to hash and sign logs using cryptographic means.
Alternatively, configure the application server or OS to send logs to a centralized log server that meets the hashing and signing requirement.